Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1212
 
7-31
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Verifying Senders
Note
The exception table applies globally to all mail flow policies with “Use Exception Table” 
enabled.
Step 2
Click Add Domain Exception on the Mail Policies > Exception Table page. 
Step 3
Enter an email address. You can enter a specific address (pres@whitehouse.gov), a name (user@), a 
domain (@example.com or @.example.com), or an address with a bracketed IP address 
(user@[192.168.23.1]).
Step 4
Specify whether to allow or reject messages from the address. When rejecting mail, you can also specify 
an SMTP code and custom response.
Step 5
Submit and commit your changes.
Searching for Addresses within the Sender Verification Exception Table
Procedure 
Step 1
Enter the email address in the Find Domain Exception section of the Exception Table page.
Step 2
Click Find.
If the address matches any of the entries in the table, the first matching entry is displayed.
Testing Your Settings for Messages from Unverified Senders
Now that you have configured sender verification settings, you can verify the behavior of your appliance.
Note that testing DNS-related settings is beyond the scope of this document.
Related Topics
Sending a Test Message with a Malformed MAIL FROM Sender Address
While it may be difficult to test the various DNS-related settings for your THROTTLED policy, you can 
test the malformed MAIL FROM setting.
Procedure 
Step 1
Open a Telnet session to your appliance.
Step 2
Use SMTP commands to send a test message with a malformed MAIL FROM (something like “admin” 
without a domain).